Oops: : 0000 [#1] PREEMPT SMP KASAN PTI Oops: general protection fault, probably for non-canonical address 0xdffffbff81fc9623: 0000 [#2] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 5440 Comm: syz.1.36 Tainted: G B 6.11.0-rc4-next-20240823-syzkaller #0 Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:console_unlock+0x143/0x4d0 kernel/printk/printk.c:3154 Code: 1b 7d 8e 48 c1 e8 03 48 89 44 24 20 c6 05 c4 b3 89 13 00 8b 7c 24 0c 4c 89 e6 4c 89 ea e8 c5 38 00 00 41 89 c7 48 8b 44 24 38 <42> 0f b6 04 30 84 c0 0f 85 84 02 00 00 0f b6 9c 24 a0 00 00 00 31 RSP: 0018:ffffc900049bee80 EFLAGS: 00010046 RAX: ffffffff81fc9623 RBX: 0000000000000000 RCX: 0000000000040000 RDX: ffff88802a1cbc00 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc900049befb0 R08: ffffffff81741156 R09: 1ffffffff2038375 R10: dffffc0000000000 R11: fffffbfff2038376 R12: ffffc900049bef30 R13: ffffc900049bef20 R14: dffffc0000000000 R15: 0000000081740d01 FS: 00007fc2bd5f86c0(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020404030 CR3: 000000002a250000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: widen_string+0x3a/0x310 lib/vsprintf.c:622 vsnprintf+0x1ccd/0x1da0 lib/vsprintf.c:2875 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: d400:0x1ffffffff2038375 Code: Unable to access opcode bytes at 0x1ffffffff203834b. RSP: 0000:ffffffff8bbc4960 EFLAGS: ffffffff8e080556 ORIG_RAX: ffffffff815e2615 RAX: ffffffff8e07942b RBX: dffffc0000000000 RCX: ffffc900049c0000 RDX: ffffffff8e0a2b68 RSI: 3de12ad4c94fd400 RDI: ffffffff8bbc4a35 RBP: ffffc900049bf3e0 R08: ffffc900049bf540 R09: ffffffff8bbc4a35 R10: ffffc900049bf4a0 R11: ffffc900049bf400 R12: ffffffff81702f30 R13: ffffffff8e0864aa R14: 0000000045e0360e R15: ffffc900049bf3b0 FS: 00007fc2bd5f86c0(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: d400 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020404030 CR3: 000000002a250000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 1b 7d 8e sbb -0x72(%rbp),%edi 3: 48 c1 e8 03 shr $0x3,%rax 7: 48 89 44 24 20 mov %rax,0x20(%rsp) c: c6 05 c4 b3 89 13 00 movb $0x0,0x1389b3c4(%rip) # 0x1389b3d7 13: 8b 7c 24 0c mov 0xc(%rsp),%edi 17: 4c 89 e6 mov %r12,%rsi 1a: 4c 89 ea mov %r13,%rdx 1d: e8 c5 38 00 00 call 0x38e7 22: 41 89 c7 mov %eax,%r15d 25: 48 8b 44 24 38 mov 0x38(%rsp),%rax * 2a: 42 0f b6 04 30 movzbl (%rax,%r14,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 0f 85 84 02 00 00 jne 0x2bb 37: 0f b6 9c 24 a0 00 00 movzbl 0xa0(%rsp),%ebx 3e: 00 3f: 31 .byte 0x31